Skip to content

3.1.20 — Control Outside Connections

Verify and control/limit connections to and use of external systems.

“External systems” means anything outside your assessment boundary:

  • The public internet
  • Partner networks
  • Your own non-CUI networks
  • Cloud services
  • Personal devices

For every connection, you need to: identify it, verify it’s authorized, and control what can flow through it. Block personal devices from CUI resources. Restrict cloud services to approved ones. Document every network connection to partners or external systems.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Are external connections identified?A complete list of every connection to outside systems
2Is external system use identified?You know what external systems your people use for CUI work
3Are connections verified?Each one is confirmed as authorized
4Are connections controlled/limited?Technical enforcement — not just policy

Documents they’ll review: Access control policy, external system use procedures, terms and conditions, system security plan, list of applications accessible externally, system config, connection agreements

People they’ll talk to: Personnel defining external access terms, sysadmins, information security staff

Live demos they’ll ask for: “Show me your external connection inventory. Try to access CUI from a personal device — show me it’s blocked.”


These are the actual questions. Have answers ready.

  • “Are all connections to external systems outside the assessment scope identified?”
  • “Which external systems are permitted to connect?”
  • “What methods ensure only authorized connections?”
  • “How do you prevent personal devices from accessing CUI?”

Shadow IT. Employees using personal Dropbox, Google Drive, or WhatsApp for CUI. DLP and CASB catch this.

No connection inventory. You don’t know all the external connections from your CUI environment.

Partner connections uncontrolled. VPN tunnels to partners with no access restrictions or monitoring.

Personal devices. No technical controls preventing CUI access from personal laptops or phones.



RequirementWhy it matters here
3.1.1 — Who Gets InFoundational access control
3.1.3 — Where CUI Can FlowControlling CUI movement to/from external systems
3.13.1 — Guard the BoundariesMonitoring at external boundaries

Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.


CMMC Practice ID: AC.L2-3.1.20 | SPRS Weight: 1 point | POA&M Eligible: Yes